Please login to use this feature. You can use this feature to add the product to your favourite list.
Close
You have added this product to your favorite list. Check My Favourite
Close
You have removed this product from your favourite list.
Close
Please login to use this feature. You can use this feature to add the company to your favourites list.
Close
This company has been added successfully. Check My Favourite
Close
This company has been removed from your favourite list.
Close
Please login to use this feature. You can use this feature to add the company to your inquiry cart.
Close
This company has been added to your inquiry cart.
Close
This company has been removed from your inquiry cart.
Close
This product has been added to your inquiry cart.
Close
This product has been removed from your inquiry cart.
Close
Maximum number of Product/Company has been reached in inquiry cart.
Close
Fictron Industrial Supplies Sdn Bhd
Fictron Industrial Supplies Sdn Bhd

How to Protect Your Business from Cyber Attacks

10-Oct-2019

How to guard your business from Cyber Attacks? Mitigating these threats takes above and beyond a single anti-virus upgrade; it involves ongoing vigilance. But shielding your systems doesn’t have to be complicated. Here is how to get started.
 
Limit Access to Your User Data & Information
 
Controlling having access to your valuable user data lessens the chance for human error, which is the number-one information security threat. If a worker leaves your company, or transfers to another company location, take protective action right away, including deleting passwords and accounts from all systems and collecting company ID badges and entry keys. An ounce of access prevention can equal a pound of protection when it comes to limiting the impact of a disgruntled ex-employee.
 
Install Surge Protectors & Uninterruptible Power Supplies
 
Uninterruptible power supplies (UPS) can provide just enough battery life and time to save your data in the event of a power disruption. Check to make sure the UPS type and size meets your standards and requirements. Every computer and networked device should be plugged into a UPS. For less-sensitive electronics and non-networked equipment, standard surge protectors should suffice. Make sure to test and replace each UPS and surge protector as recommended by the manufacturer.
 
Patch Your Operating Systems & Software Regularly
 
Whatever new app can open the door to a cyber attack if you don’t on a regular basis patch and update all software on every device used by your employees. Regularly check for updates when purchasing a new computer or installing a new software system. Understand that software suppliers aren't required to provide security updates for unsupported products. For example, Microsoft® will stop supporting Windows 7 in January of 2020, so if you've not up-graded yet, now is the time. Do not holdup downloading operating system updates. Updates often include new or enhanced security features.
 
Install & Activate Software and Hardware Firewalls
 
Firewalls can combat malevolent hackers and hinder employees from browsing inappropriate websites. Install and update firewall systems on every employee computer, smartphone, and networked device. Include off-site employees, even in the event you use a cloud service provider (CSP) or a virtual private network (VPN). You may also want to install an intrusion detection/prevention system (IDPS) to provide a greater level of protection.
 
Secure All Wireless Access Points & Networks
 
For secure wireless networking, use these router best practices:
- Change the new device administrative password
- Set the wireless access point so that it does not broadcast its service set identifier (SSID)
- Set your router to use WiFi Protected Access 2 (WPA-2), with the Advanced Encryption Standard (AES) for encryption
- Avoid using WEP (Wired-Equivalent Privacy).
 
For guest WiFi access, use a separate network from your business account.
 
Set up Web & Email Filters
 
Use email and web browser filters to dissuade hackers and restrict spam from clogging employee inboxes. You can also download “blacklist” services to block users from browsing speculative websites that pose malware risks. Caution your employees against visiting sites that are frequently linked with cybersecurity threats, such as pornographic websites or social media. This might appear to be a no-brainer; but it only takes one employee to visit the wrong website to inadvertently download malware.
 
Use Encryption for Sensitive Business Information
 
Use full-disk encryption to shield all your computers, tablets, and smartphones. Save a copy of your encryption password or key in a protected place distinct from your stored backups. Email recipients typically need the same encryption capability in order to decrypt. Never send the password or key in the same email as the encrypted document. Give it to them via phone or some other method.
 
Dispose of Old Computers & Media Safely
 
Before donating or trashing old computers, you must remove all important hard drive information. Remove any sensitive business or personal data on old CDs, flash drives, or other old media. Then destruct these items or take them to a company that will shred them for you. Destroy sensitive paper information with a crosscut shredder or an incinerator.
 
Train Your Employees
 
Cyber-vigilant employees are your best protection against information security threats.
 
Every employee should know:
- What business and personal use is permitted for emails
- How to treat business information at the office or at home
- What to do if a cybersecurity incident occurs
 
Train any new employee to protect valuable data and get them to sign your information policy. Use newsletters and/or ongoing training to boost your culture of cybersecurity. Now that we've covered the key steps to protect your valuable data and information, we will show you how to install mechanisms for detecting and recognizing a cyber attack in part three of our series on “Cybersecurity for Manufacturers” from the MEP National Network.
 
Main Office

Fictron Industrial Supplies Sdn Bhd
No. 7 & 7A, Jalan Tiara, Tiara Square, Taman Perindustrian Sime UEP, 47600 Subang Jaya, Selangor, Malaysia.

Tel:
Fax:

Email:
Website: http://www.fictron.biz
Website: https://fictron.newpages.com.my/
Website: https://fictron.n.my/
Website: http://fictron.newstore.my/

Other Office

Fictron Industrial Automation Pte Ltd
140 Paya Lebar Road, #03-01, AZ @ Paya Lebar 409015, Singapore.

Tel:
Email:

1
Hello! Thanks for visiting my site. Please press Start button to Contact with Admin :)

Start

Browse by : Home - Classifieds - Companies - Location - Tags - Products - News & Promotion - Job Vacancy - Mobile Website - Google - SEO Results

NEWPAGES

  • US 1404
  • MY 1043
  • CN 404
  • AP 105
  • GB 95
  • AU 89
  • CA 72
  • IE 57
People Online
Seni Jaya Logo
Brochure
Download
Our PackageContact Us